Sciweavers

14824 search results - page 2768 / 2965
» Security - Introduction
Sort
View
USS
2010
14 years 9 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
14 years 9 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
128
Voted
WISE
2010
Springer
14 years 9 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
WOTE
2010
14 years 9 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan
156
Voted
AVSS
2009
IEEE
14 years 9 months ago
Counting People in Groups
Abstract--Cameras are becoming a common tool for automated vision purposes due to their low cost. In an era of growing security concerns, camera surveillance systems have become no...
Duc Fehr, Ravishankar Sivalingam, Vassilios Morell...
« Prev « First page 2768 / 2965 Last » Next »